Insider Forgery Cryptanalysis of Two Post-Quantum Multi-Signature Schemes
In 2010, M. Meziani and P.-L. Cayrel presented two post-quantum multi-signature schemes based on the syndrome decoding hard problem and error correcting codes. In this paper, we propose the insider forgery cryptanalysis of M. Meziani et al.s post-quantum multi-signature schemes. In M. Meziani et al....
Saved in:
Published in | Applied Mechanics and Materials Vol. 437; no. Industrial Design and Mechanics Power II; pp. 876 - 879 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Zurich
Trans Tech Publications Ltd
01.10.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In 2010, M. Meziani and P.-L. Cayrel presented two post-quantum multi-signature schemes based on the syndrome decoding hard problem and error correcting codes. In this paper, we propose the insider forgery cryptanalysis of M. Meziani et al.s post-quantum multi-signature schemes. In M. Meziani et al.s schemes, the verifier only verifies the final multi-signature and does not check the validity of the partial signatures generated by other signers. Thus the malicious last signer can forge a valid multi-signature by himself/herself on behalf of the group of signers, which can pass the verification of the verifier. Therefore, M. Meziani et al.s post-quantum multi-signature schemes do not meet the security requirements of multi-signature schemes. |
---|---|
AbstractList | In 2010, M. Meziani and P.-L. Cayrel presented two post-quantum multi-signature schemes based on the syndrome decoding hard problem and error correcting codes. In this paper, we propose the insider forgery cryptanalysis of M. Meziani et al.s post-quantum multi-signature schemes. In M. Meziani et al.s schemes, the verifier only verifies the final multi-signature and does not check the validity of the partial signatures generated by other signers. Thus the malicious last signer can forge a valid multi-signature by himself/herself on behalf of the group of signers, which can pass the verification of the verifier. Therefore, M. Meziani et al.s post-quantum multi-signature schemes do not meet the security requirements of multi-signature schemes. |
Author | Diao, Lu Hong Kong, Fan Yu Zhou, Da Shui Jiang, Ya Li Yu, Jia |
Author_xml | – givenname: Fan Yu surname: Kong fullname: Kong, Fan Yu email: fanyukong@sdu.edu.cn organization: Shandong University : Institute of Network Security – givenname: Da Shui surname: Zhou fullname: Zhou, Da Shui email: dszhou@sdu.edu.cn organization: Shandong University : Institute of Network Security – givenname: Jia surname: Yu fullname: Yu, Jia email: yujia@qdu.edu.cn organization: Qingdao University : College of Information Engineering – givenname: Lu Hong surname: Diao fullname: Diao, Lu Hong email: diaoluhong@bjut.edu.cn organization: Beijing University of Technology : College of Applied Sciences – givenname: Ya Li surname: Jiang fullname: Jiang, Ya Li email: jiang.yl@sdu.edu.cn organization: Shandong University : Institute of Network Security |
BookMark | eNqNkF1LHDEUQEO1ULX-h4FC8WXGfE2SeSnK4seCS1u0zyGTuaOR2WRNMiz775u6gqVPzct9yOFc7jlGhz54QOgrwQ3HVJ1vt9smWQc-u9HZxkM-v1ytGs5ko6T4gI6IELSWXNEDdNpJxTCTqlWdkIevf7juGBOf0HFKzxgLTrg6QsulT26AWF2H-AhxVy3ibpONN9MuuVSFsXrYhupHSLn-ORuf53W1mqfs6nv36E2eI1T39gnWkD6jj6OZEpy-zRP06_rqYXFb332_WS4u72rLqMq17QeBWYcxl5z1gg6ESc5xy3FHqTKDGqC1bVce6Qn0QoFsJWVGjEPP246wE3S2925ieJkhZb12ycI0GQ9hTpq0QhIsGVcF_fIP-hzmWG4rFOeMCqpeqW97ysaQUoRRb6Jbm7jTBOs_5XUpr9_L61Jel_K6lNelfBFc7AU5Gp8y2Ke_9vyf4jdmbJMe |
Cites_doi | 10.1007/978-3-642-10366-7_6 10.1007/978-3-642-13190-5_27 10.1007/978-3-642-13577-4_8 10.1145/1060590.1060603 10.1145/237814.237838 10.1145/1374376.1374407 10.1145/1374376.1374406 10.1145/1180405.1180453 10.1007/3-540-45682-1_10 10.1137/s0097539795293172 10.1007/bfb0024461 10.1007/978-3-642-21323-6_17 |
ContentType | Journal Article |
Copyright | 2013 Trans Tech Publications Ltd Copyright Trans Tech Publications Ltd. Oct 2013 |
Copyright_xml | – notice: 2013 Trans Tech Publications Ltd – notice: Copyright Trans Tech Publications Ltd. Oct 2013 |
DBID | AAYXX CITATION 7SR 7TB 8BQ 8FD 8FE 8FG ABJCF ABUWG AFKRA BENPR BFMQW BGLVJ CCPQU D1I DWQXO FR3 HCIFZ JG9 KB. KR7 L6V M7S PDBOC PQEST PQQKQ PQUKI PRINS PTHSS 7U5 L7M |
DOI | 10.4028/www.scientific.net/AMM.437.876 |
DatabaseName | CrossRef Engineered Materials Abstracts Mechanical & Transportation Engineering Abstracts METADEX Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central AUTh Library subscriptions: ProQuest Central Continental Europe Database Technology Collection ProQuest One Community College ProQuest Materials Science Collection ProQuest Central Engineering Research Database SciTech Premium Collection (Proquest) (PQ_SDU_P3) Materials Research Database Materials Science Database Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database Materials Science Collection ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection Solid State and Superconductivity Abstracts Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Materials Research Database Technology Collection Technology Research Database Mechanical & Transportation Engineering Abstracts Materials Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central Engineered Materials Abstracts ProQuest Engineering Collection ProQuest Central Korea Materials Science Database Engineering Collection ProQuest Materials Science Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection Continental Europe Database ProQuest SciTech Collection METADEX ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic Solid State and Superconductivity Abstracts Advanced Technologies Database with Aerospace |
DatabaseTitleList | Civil Engineering Abstracts Materials Research Database CrossRef |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1662-7482 |
EndPage | 879 |
ExternalDocumentID | 3103432291 10_4028_www_scientific_net_AMM_437_876 |
GroupedDBID | .DC 3V. 4.4 6J9 8FE 8FG ABHXD ABJCF ABJNI ABUWG ACGFO ACGFS ACIWK AFKRA ALMA_UNASSIGNED_HOLDINGS BENPR BFMQW BGLVJ BPHCQ CCPQU CZ9 D1I DB1 DKFMR EBS EJD HCIFZ KB. KC. L6V M7S P2P PDBOC PQQKQ PROAC PTHSS RNS RTP AAYXX ABDNZ ACYGS CITATION 7SR 7TB 8BQ 8FD DWQXO FR3 JG9 KR7 PQEST PQUKI PRINS 7U5 L7M |
ID | FETCH-LOGICAL-c328t-cbd6039004743b62d1374405409228ad8de5c599991b1eb68e75723a6fdb45913 |
IEDL.DBID | 8FG |
ISBN | 9783037858967 3037858966 |
ISSN | 1660-9336 1662-7482 |
IngestDate | Fri Apr 12 04:02:35 EDT 2024 Thu Oct 10 16:18:37 EDT 2024 Fri Aug 23 03:51:47 EDT 2024 Fri Jul 05 15:07:45 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | Industrial Design and Mechanics Power II |
Keywords | Digital Signature Error Correcting Codes Multi-Signature Scheme Post-Quantum Cryptography |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c328t-cbd6039004743b62d1374405409228ad8de5c599991b1eb68e75723a6fdb45913 |
Notes | Selected, peer reviewed papers from the 2013 2nd International Conference on Industrial Design and Mechanics Power (ICIDMP 2013) August 24-25, 2013, Nanjing, China ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 1443262848 |
PQPubID | 2029177 |
PageCount | 4 |
ParticipantIDs | proquest_miscellaneous_1567107348 proquest_journals_1443262848 crossref_primary_10_4028_www_scientific_net_AMM_437_876 transtech_journals_10_4028_www_scientific_net_AMM_437_876 |
PublicationCentury | 2000 |
PublicationDate | 20131001 |
PublicationDateYYYYMMDD | 2013-10-01 |
PublicationDate_xml | – month: 10 year: 2013 text: 20131001 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Zurich |
PublicationPlace_xml | – name: Zurich |
PublicationTitle | Applied Mechanics and Materials |
PublicationYear | 2013 |
Publisher | Trans Tech Publications Ltd |
Publisher_xml | – name: Trans Tech Publications Ltd |
References | 1194805 1194806 1194803 1194814 1194804 1194815 1194809 1194807 1194808 1194801 1194812 1194802 1194813 1194810 1194811 |
References_xml | – ident: 1194809 doi: 10.1007/978-3-642-10366-7_6 – ident: 1194806 doi: 10.1007/978-3-642-13190-5_27 – ident: 1194807 doi: 10.1007/978-3-642-13577-4_8 – ident: 1194803 doi: 10.1145/1060590.1060603 – ident: 1194802 doi: 10.1145/237814.237838 – ident: 1194805 doi: 10.1145/1374376.1374407 – ident: 1194804 doi: 10.1145/1374376.1374406 – ident: 1194813 doi: 10.1145/1180405.1180453 – ident: 1194808 – ident: 1194811 doi: 10.1007/3-540-45682-1_10 – ident: 1194801 doi: 10.1137/s0097539795293172 – ident: 1194810 doi: 10.1007/bfb0024461 – ident: 1194812 – ident: 1194815 – ident: 1194814 doi: 10.1007/978-3-642-21323-6_17 |
SSID | ssj0064148 ssj0001192370 |
Score | 1.9612576 |
Snippet | In 2010, M. Meziani and P.-L. Cayrel presented two post-quantum multi-signature schemes based on the syndrome decoding hard problem and error correcting codes.... |
SourceID | proquest crossref transtech |
SourceType | Aggregation Database Publisher |
StartPage | 876 |
SubjectTerms | Cryptography Decoding Error correcting codes Forges Security Signatures |
Title | Insider Forgery Cryptanalysis of Two Post-Quantum Multi-Signature Schemes |
URI | https://www.scientific.net/AMM.437.876 https://www.proquest.com/docview/1443262848 https://search.proquest.com/docview/1567107348 |
Volume | 437 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JatxAEC0cG5L4YJyNTOKYDhjf2lGrV52CYywvMMYr8a0ZdfeEHDyaeGYI_vtUSZrlZHISQiuvq6teL_UKYE-HoRNSBI7BPHJlneSVtYYXOhNJ2qGKmhKc-xfm9E6d3-v7bsJt0m2rnPvExlHHOtAc-Tck_sg00Jm67-M_nKpG0epqV0LjBWwIUsKjTPHyZDnHQvSF7LH1zEaJppqWMCbjOJA3lOuRSeu0Q9LfqvEszu1L2EePgsMr1_xUm59I23eaOYPDfv9ASXvgSKxkNaItaeqrKUUbkmJdiVjlNmx1VJMdtrbxBtbS6C1srggQvoOzs7ZcJyvrJjuaHT0-jZEutkIlrB6y2781o4K-_GqGbTB7YE3GLr_5_auVBGU32OoPafIe7srj26NT3hVX4EHmbspDFU0mC1KLVLIyeRSStAKRwBV57gbRxaSDLog_ViJVxiWrbS4HZhgrpQshP8D6qB6lj8AMDiIHMjp0m0nJEPAZHZyN0amQJeV6YOcA-XGroeFx7EHQeoTWL6H1CK1HaD1C6xHaHuzM8fRd35r4pSX04OviMvYKWuoYjFI9w3u0QepEyj09KBbtsPKO__r8p-c__xle51Qco9natwPr08dZ-oIUZVrtNna4Cxs_ji8ur-lY9q9-_gPqEeL9 |
link.rule.ids | 315,786,790,12792,21416,27957,27958,33408,33409,33779,33780,43635,43840 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB7RIJX2UNEHasrLSFVvprvr554QRUQJJREtQeJmZW2n6oFsShJV_fed2d08Tojjah9efbbH34w93wB8Vn5sU5F6jot54NJYwQtjNM9VkkZhxjIoSnDuD3T3Tl7dq_sm4DZrjlUubWJlqEPpKUb-FYk_Mg00pvZs-odT1SjaXW1KaLyAbSnQVWnB9rfLwc3PdZSFCAyNyNo2a5lW9bRSrROOrrymbI9EGKss0v5aj2d1bV7CF7Qp6GDZ6rfqDEU6wFNFDc77_VMpzKkluZLNNW1NVHfmtN6QGOvGmtXZhTcN2WTn9eh4C1tx8g5eb0gQvodery7YyTpllR_NLh7_TZEw1lIlrByz4d-SUUlf_mOBvbB4YFXOLr_9_asWBWW32O8PcfYB7jqXw4sub8orcC8yO-e-CDoROelFSlHoLKSC1AKRwuVZZkfBhqi8yolBFmkstI1GmUyM9DgUUuWp2IPWpJzEj8A0upEjESwaziiF9_iO8taEYKVPorRtMEuA3LRW0XDofRC0DqF1a2gdQusQWofQOoS2DQdLPF0zu2ZuPRbacLK6jfOCNjtGk1gu8BmlkTyRdk8b8lU_bHzjWc1_err5Y9jpDvvX7ro3-L4PrzIqlVEd9DuA1vxxEQ-RsMyLo2ZU_gdSlOQT |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Insider+Forgery+Cryptanalysis+of+Two+Post-Quantum+Multi-Signature+Schemes&rft.jtitle=Applied+Mechanics+and+Materials&rft.au=Kong%2C+Fan+Yu&rft.au=Diao%2C+Lu+Hong&rft.au=Yu%2C+Jia&rft.au=Jiang%2C+Ya+Li&rft.date=2013-10-01&rft.pub=Trans+Tech+Publications+Ltd&rft.isbn=9783037858967&rft.issn=1660-9336&rft.eissn=1662-7482&rft.volume=437&rft.spage=876&rft_id=info:doi/10.4028%2Fwww.scientific.net%2FAMM.437.876&rft.externalDocID=3103432291 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.scientific.net%2FImage%2FTitleCover%2F2773%3Fwidth%3D600 |